1. Which audit technique provides the GREATEST assurance that incident management procedures are effective?
A) Determining whether incidents are categorized and addressed B) Performing comprehensive vulnerability scanning and penetration testing C) Comparing incident management procedures to best practices D) Evaluating end-user satisfaction survey results
2. Which of the following findings would be of MOST concern to an IS auditor performing a review of an end-user developed application that generates financial statements?
A) The application is not sufficiently supported by the IT department B) There is not adequate training in the use of the application C) There is no adequate user license for the application D) There is no control to ensure accuracy of the processed data
3. An organization plans to deploy Wi-Fi location analytics to count the number of shoppers per day across its various retail outlets. What should the IS auditor recommend as the FIRST course of action by IT management?
A) Conduct a privacy impact assessment B) Mask media access control (MAC) addresses C) Survey shoppers for feedback D) Develop a privacy notice to be displayed to shoppers
4. An IS auditor discovered abnormalities in a monthly report generated from a system upgraded six months ago. Which of the following should be the auditor'sFIRST course of action?
A) Inspect source code for proof of abnormalities B) Perform a change management review of the system C) Schedule an access review of the system D) Determine the impact of abnormalities in the report
5. When auditing the effectiveness of a biometric system, which of the following indicators would be MOST important to review?
A) False negatives B) False acceptance rate C) Failure to enroll rate D) System response time
Leave a comment